Data Science Methodology for Cybersecurity Projects

Cyber-security solutions are traditionally static and signature-based. The traditional solutions along with the use of analytic models, machine learning and big data could be improved by automatically trigger mitigation or provide relevant awareness to control or limit consequences of threats. This kind of intelligent solutions is covered in the context of Data Science for Cyber-security. Data Science provides a significant role in cyber-security by utilising the power of data (and big data), high-performance computing and data mining (and machine learning) to protect users against cyber-crimes. For this purpose, a successful data science project requires an effective methodology to cover all issues and provide adequate resources. In this paper, we are introducing popular data science methodologies and will compare them in accordance with cyber-security challenges. A comparison discussion has also delivered to explain methodologies strengths and weaknesses in case of cyber-security projects.

[1]  Mangesh Bedekar,et al.  Inferring emotional state of a user by user profiling , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[2]  U. M. Feyyad Data mining and knowledge discovery: making sense out of data , 1996 .

[3]  Debajyoti Mukhopadhyay,et al.  User Profiling Trends, Techniques and Applications , 2015, ArXiv.

[4]  Manuel Filipe Santos,et al.  KDD, SEMMA and CRISP-DM: a parallel overview , 2008, IADIS European Conf. Data Mining.

[5]  Stuart E. Middleton,et al.  Ontological user profiling in recommender systems , 2004, TOIS.

[6]  Ali Idri,et al.  User profile model: A user dimension based classification , 2015, 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA).

[7]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery: An Overview , 1996, Advances in Knowledge Discovery and Data Mining.

[8]  Tom Fawcett,et al.  Data Science and its Relationship to Big Data and Data-Driven Decision Making , 2013, Big Data.

[9]  Plamen P. Angelov,et al.  Creating Evolving User Behavior Profiles Automatically , 2012, IEEE Transactions on Knowledge and Data Engineering.